Yi Tang

Orcid: 0000-0003-2483-9479

Affiliations:
  • Guangzhou University, Department of Mathematics, China
  • Zhongshan University, Department of Mathematics, Guangzhou, China (former)
  • Sun Yat-sen University, Department of Mathematics, Guangzhou, China (PhD 2003)


According to our database1, Yi Tang authored at least 23 papers between 2003 and 2022.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2022
Confusing Traffic against Intra-domain Webpage Fingerprinting Attacks.
Proceedings of the IEEE International Conference on Trust, 2022

2021
Website fingerprinting on early QUIC traffic.
Comput. Networks, 2021

2019
Fast neighbor search by using revised <i>k</i>-d tree.
Inf. Sci., 2019

2018
A Homomorphic Network Coding Signature Scheme for Multiple Sources and its Application in IoT.
Secur. Commun. Networks, 2018

Cloud-aided lightweight certificateless authentication protocol with anonymity for wireless body area networks.
J. Netw. Comput. Appl., 2018

Normal Cloud Model-Based Algorithm for Multi-Attribute Trusted Cloud Service Selection.
IEEE Access, 2018

An ID-Based Linearly Homomorphic Signature Scheme and Its Application in Blockchain.
IEEE Access, 2018

A Security Concern About Deep Learning Models.
Proceedings of the Science of Cyber Security - First International Conference, 2018

Generating Misleading Labels in Machine Learning Models.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2018

2016
Private Indexes for Mixed Encrypted Databases.
Trans. Large Scale Data Knowl. Centered Syst., 2016

2015
EQPO: Obscuring Encrypted Web Traffic with Equal-Sized Pseudo-Objects.
Proceedings of the Information Security and Cryptology - 11th International Conference, 2015

2014
Constructing Private Indexes on Encrypted Data for Outsourced Databases.
Proceedings of the Future Data and Security Engineering - First International Conference, 2014

2012
Trusted architecture for farmland wireless sensor networks.
Proceedings of the 4th IEEE International Conference on Cloud Computing Technology and Science Proceedings, 2012

2010
AASC: Anonymizing network addresses based on subnet clustering.
Proceedings of the IEEE International Conference on Wireless Communications, 2010

2006
A Method for Reducing False Hits in Querying Encrypted Databases.
Proceedings of the Eighth IEEE International Conference on E-Commerce Technology (CEC 2006) / Third IEEE International Conference on Enterprise Computing, 2006

Anting: An Adaptive Scanning Method for Computer Worms.
Proceedings of the 2006 IEEE / WIC / ACM International Conference on Web Intelligence (WI 2006), 2006

Sharing Session Keys in Encrypted Databases.
Proceedings of the 2006 IEEE International Conference on e-Business Engineering (ICEBE 2006), 2006

A Multi-agent Based Method for Reconstructing Buckets in Encrypted Databases.
Proceedings of the 2006 IEEE/WIC/ACM International Conference on Intelligent Agent Technology, 2006

2005
INFO: An Improving Strategy for Searching the Small World Networks.
Proceedings of the 2005 IEEE / WIC / ACM International Conference on Web Intelligence (WI 2005), 2005

Adaptive Bucket Formation in Encrypted Databases.
Proceedings of the 2005 IEEE International Conference on e-Technology, e-Commerce, and e-Services (EEE 2005), 29 March, 2005

2004
Multi-agent collaborative service and distributed problem solving.
Cogn. Syst. Res., 2004

Aggregating Local Behaviors Based Upon a Discrete Lagrange Multiplier Method.
Proceedings of the 2004 IEEE/WIC/ACM International Conference on Intelligent Agent Technology (IAT 2004), 2004

2003
Agent Compromises in Distributed Problem Solving.
Proceedings of the Intelligent Data Engineering and Automated Learning, 2003


  Loading...